CN106415638A - Method of use of a unique product identification code - Google Patents
Method of use of a unique product identification code Download PDFInfo
- Publication number
- CN106415638A CN106415638A CN201580013296.3A CN201580013296A CN106415638A CN 106415638 A CN106415638 A CN 106415638A CN 201580013296 A CN201580013296 A CN 201580013296A CN 106415638 A CN106415638 A CN 106415638A
- Authority
- CN
- China
- Prior art keywords
- upic
- product
- user
- purchase
- database manager
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 230000004044 response Effects 0.000 claims abstract description 10
- 230000000694 effects Effects 0.000 claims description 6
- 230000003213 activating effect Effects 0.000 claims description 3
- 230000004913 activation Effects 0.000 claims description 2
- 230000000717 retained effect Effects 0.000 claims description 2
- 239000000047 product Substances 0.000 claims 32
- 239000006227 byproduct Substances 0.000 claims 3
- 238000011156 evaluation Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 28
- 230000008901 benefit Effects 0.000 description 5
- 230000010354 integration Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000007689 inspection Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003449 preventive effect Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0623—Item investigation
- G06Q30/0625—Directed, with specific intent or strategy
- G06Q30/0627—Directed, with specific intent or strategy using item specifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
- G06Q30/015—Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
- G06Q30/016—After-sales
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computational Linguistics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A method of use of a unique product identification code (UPIC) being emitted by a database manager, associated with and applied on a product provides a first UPIC query with a database manager for information on the same product by a user through a software application, an evaluation of a validity of the UPIC by the database manager, a response of the database manager to the user with information related to the product, or if the same product was already purchased, a creation of a provisional connection between the user code and the UPIC that is queried through said software application. The user gives a proof of an alleged purchase of the product by a second UPIC query that is made by the same user at the end of a determined first time period from the first UPIC query, with no other user having queried the same UPIC before the second UPIC query.
Description
Technical field
The present invention relates to a kind of method using the unique product identification code for each product.Especially, this is unique
Product identification code issued by database manager and be associated with product and be applied on product, so that can be by electric
Sub- equipment is inquiring about this unique product identification code.The method is intended in particular to hit fake products.
Background technology
A kind of use is described in the U.S. Patent application US2007288267A1 that August in 2007 is submitted on the 10th by Fou
Method that is being distributed by database manager and visibly applying the globally unique product identification code on product.The party
Method comprises the following steps:Whether the unique identification code being received from consumer to database manager inquiry UPIC, determination is right
Should in effective product identification code, determine whether unique product identification code was previously inquired about, previous based on such code
The fact that be not queried determines the effectiveness of unique product identification code.If effectiveness is not identified, by number
According to librarian, the response of consumer is given with fake products, and similar message is sent to other consumers.
Said method specifies, consumer can just buy product before starting determining the process of genuineness of product.This
Constitute shortcoming in many cases.Code can neither be inquired about to obtain intending with regard to consumer before buying product by consumer
The general information of the feature of product bought and the other information of article itself, nor determine that purchase is intended by consumer
The product bought is genuine piece or counterfeit.
The international patent application WO2009/074866 of US priority represent Hosp, having on December 13rd, 2007 retouches
State a kind of method with the product of identification code for checking.The database manager of the wherein identification code of storage product can pass through
Check whether and in data base, inquired identification code to answer the inquiry to code being carried out by consumer.If identification code exists
Past has been queried and once or has alternately been queried fixing number of times, then data base administration person can negate pass
Answer in this product.Database manager can queried identification code based in the type of product, its manufacturer, past
Number of times, to comment with regard to encroach right data, manufacturer, the criterion selected in the value of product and its original producton location of statistics of product
The probability of the personation of the yield by estimation product.It is understood that Hosp does not provide the standard of the master of the product that identification code is queried
Really answer.Compared with the patent application of Fou, Hosp allows at any time, i.e. inquiry mark before or after buying product
Code, but it does not provide the consumer with any confirmation.It only serve database manager with train (hone) its to product this
The assessment of the master of body.
German patent application DE 10 2,006 016830 A1 being submitted on October 11st, 2007 by Springer is open
A kind of using by the database manager being defined as prior art in the preamble of the claim 1 in this patent application
The method of the unique product identification code issued.Springer does not allow checking to apply at most unique identical code
In a product, and therefore, do not allow to verify the product with identical code bought by other users.
Content of the invention
It is an object of the invention to instead providing a kind of method, the method allows any user to obtain with regard to producing
The response of the genuineness of product, using as carried out before and after the buying product, result to the inquiry of product identification code.
In the case that another purpose is the control outside not using the relation between manufacturer and user, with automatically and
Effective manner is checking the purchase to product by user.
Another object of the present invention be allow not limit the user of the quantity authentication code to inquire about identical product so that
Obtain the information with regard to this product.
Another object of the present invention is directed to any active relevant with product before and after buying product and arranges
Apply (initiative) and create two-way communication between user and data base.
Equally, communicate it is an object of the invention to creating between user and manufacturer, this communication is not concerned only with product,
Also focus on any active measures relevant with product taken before and after buying product by manufacturer or other users
Propagation.
Another object of the present invention is the product that suggestion user buys master, the product of described master be possible to have by
The excitation of such as discount that manufacturer is provided, gift, integration or the like, and it is typically directed to loyal consumer and occurs
's.
Another purpose is the product of the manufacturer with regard to commercially occurring that counterfeit and manufacturer is led to
Know.
Another purpose is to stop potential personator that fake products puts goods on the market.
Another purpose is so that the bucket that the mechanism that controls power (Control Authority) can be at it with counterfeit behavior
Immediately it is hit after its fake products is put goods on the market by personator in striving.
These and other purpose are to be determined in independent claims and dependent claims appended by this specification
The method using unique product identification code (below is UPIC) of justice is realized.
Brief description
Refer to the attached drawing, shows the preferred embodiment of the method using UPIC, wherein in the following detailed description:
Fig. 1 is the flow chart of the embodiment of the method for the use UPIC according to the present invention, the flow diagrams illustrates by user
Database manager is used for executing the step performed by the method.
Specific embodiment
The method of the use UPIC according to the present invention based on the fact that:The issued UPIC of database manager, enter
And then associated by manufacturer and apply to its product, this database manager can according to set by database manager simultaneously
And the criterion that is described below and intercept identical with those UPIC of product being applied to bought by other users
UPIC.
As is known, using the method for UPIC allow any user to the inquiry of database manager in case receive with regard to
The information data of this product, wherein, described UPIC is issued by database manager, and is associated by manufacturer and be applied to produce
Product are so that create corresponding relation between UPIC and product itself.Term " issue " briefly means that UPIC is by data depositary management
Manage that device is generated and be sent to the manufacturer that endorsed supply contract.Term " (active) of activity " is briefly
Mean manufacturer single UPIC with about manufacturer itself enter into data base product information data it
Between create connection.Term " inquiry " briefly means that UPIC is obtained in data base or is subsequently queried.Term
" user " briefly means that the application software being provided by database manager is arranged on such as smart phone, flat board calculates
Machine and be obtained in that and send anyone on the electronic equipment of any other equipment of data etc;Described application software
And then passed through personal code work and activating pin by uniquely close be coupled to user, described personal code work is to database manager mark
Know this user.Term " database manager " briefly means the one of runtime database as hardware and software computer system
Cut things.
It is known technology based on the inquiry of UPIC, and various modifications can be carried out according to different selections;Therefore,
Do not need these aspects are described in detail.Also should be well known that, after queried UPIC, database manager is assessed
The effectiveness of UPIC and provide user and answer, described answer can include genuineness to product and its related letter of feature
Breath, and the information with regard to the previous purchase (if any) to identical product by another user, it is right that this information has
Face the exchange of the clear and definite risk of non-certified products.
The method according to the invention, by after the given first time period from the first inquiry beginning of user, by same
What one user was carried out sets up the criterion for the purchase by user to product declared to the second of UPIC the inquiry, and this first is looked into
Ask and create interim connection between UPIC and personal code work.If same user profit after the first time period of described determination
Inquire about same UPIC again with same electronic equipment, and assume between first and second inquiries of same user not by
Another user inquires about to same UPIC, then this connection becomes permanent.In other words, proving declaring to product
Before purchase is associated, only UPIC inquiry once is performed it is allowed to by second user to same UPIC by first user
Another one query.Break facing of the static state between UPIC and the personal code work of first user by the inquiry that second user is carried out
When connect, restart to be conducive to (in favor of) second user described determined by first time period;In this time period
End at, by database manager automatically the second inquiry to same UPIC for the request, this inquiry is to say to database manager
Inquiry required for the bright purchase declared by second user to product.Identical situation can betide the 3rd user, and this
Three users will itself insert in the interim connection of second user, by that analogy.
When after the invitation of database manager, user to be provided to product to second inquiry of same UPIC by execution
The moment of the evidence of the purchase declared of product, database manager give same user to be reserved to the information of user, document and
The exclusive access right of benefit.
Once provided the evidence of the purchase declared to product by user, if this product of non-certified products, number
Just provide answer according to librarian to the whole other users that should inquire about same UPIC.
Alternatively, the method according to the invention establishes:If terminate in first time period determined by described and
In second time period determined by after the invitation of database manager, same user does not carry out the second inquiry to UPIC, then exist
Interim connection between the user being identified by the personal code work of itself by database manager and the UPIC of the product inquired about
To interrupt.
Advantageously, first time period determined by described in the purchase-transaction impact of product;Especially, the actual purchase to product
Buy first time period determined by replacement.Obviously, wherein have to carry out second time period determined by the second inquiry in this feelings
No longer have an impact under condition, and be extended to endless or predetermined time.For example, if purchased at retail shop
Do not inquire about UPIC before buying, then the checkout counter by shop for the UPIC, this can provide user to this to database manager
The proof of the actual purchase of product.
In sum, the method according to the invention, from user to database manager inquire about UPIC step provide as
Under one of response response.
In the first Directory Enquiries to movable UPIC, result is to create temporarily connecting between UPIC and personal code work
Connect, the information being input in this data base and taken from by manufacturer one group of data is sent to user by database manager.Live
Dynamic UPIC means to be distributed to unique code of manufacturer by database manager, and described manufacturer is by UPIC and a set product
Data is associated, and is applied to corresponding product.When UPIC is activity and when having interim connection, one will be taken from
The information with regard to product of group data is sent to user.When UPIC is activity and when having permanently connected, one group will be taken from
The further information with regard to product of data is sent to user.
Database manager identifies that inquired about UPIC is such a code, this code be reserved for user so as
User have been provided for proof that the product declared buys and having been able to access the information of same user of being reserved to, document,
With after benefit it is allowed to user carries out extra inquiry to same UPIC.On the other hand, if user's inquiry is not belonging to this data
UPIC that is storehouse or not being activated, then database manager transmission result (consequential) information.Except carry out
Inquiry user outside any other people declare or actual purchase product in the case of, UPIC is construed to by database manager
Intercepted, and subsequently send the information (if any) that product is non-certified products.
May even happen that user wants to return user to seller and have been presented for proof that declare or actual purchase
Product.When returned work, by described user, the UPIC being retained is revised as the UPIC of activity, so that this UPIC is permissible
By subsequent user's inquiry, without misleading answer before purchase and afterwards by transmission.Therefore, have purchased product
Above user abandons previously being reserved to his/her information, document or benefit.Hereinafter, in order to illustrate according to the present invention's
Using the embodiment of the method for UPIC, first reference is carried out to the flow chart in Fig. 1.
Process starts, and in step 1, obtains UPIC by electronic equipment, and electronic equipment can be for example intelligent
Phone, tablet PC or the software for inquiring about UPIC itself being provided by database manager can be provided thereon
The other equipment of application.Although not illustrating in a flow diagram in figure 1, provide application soft from by personal code work to him/her
The database manager of part carrys out identifying user, and described personal code work can be by the honeycomb electricity of the company's distribution providing telephone service
Words number, or the IMEI uniquely identifying each mobile terminal.Alternately, can select to uniquely identify any of user
Other users code.User is authorized by the operator of data base to use application soft by activating pin on its electronic equipment
Part.Application software allows user detection UPIC.Proceed to step 2, reading is sent to database manager.
In step 3, database manager receives reading and starts the process of the detailed description of UPIC.
Step 4 is decision block, here, whether database manager checking UPIC belongs to its data base.
If UPIC is not belonging to data base, it is transmitted what warning was inquired about in steps of 5 on consumer electronic devices
The UPIC not warning in data base or alarm.Process terminates.If UPIC belongs to data base, process movement to decision block 6,
Here checks whether UPIC is movable.If not movable, then process advances to step 7, here, sending with regard to this one
Segment information and attention and alarm signal, and process terminates.In the case of affirmative reply (that is, UPIC is activation),
Whether process movement is to square frame 8, here, having existed permanently connected between the inquired about UPIC of inspection and user.If answered
Affirmative, process just moves to decision block 9, here, the user being inquired about and establishment this permanently connected be whether
Same person.
If same person, then process goes to step 10, here, the security information with regard to the benefit for user is sent out
Give user;Then, process movement is to decision block 11, here, checking whether user has been received by integration or other benefits.
In the case of being negative response in decision block 11, process comes step 12, here, reward points or other are good
Locate, and process terminates.In the case of positive response, process terminates.
If in decision block 9, the answer is in the negative, i.e. the user being inquired about and create that this is permanently connected not
It is same person, then process comes step 13, here, sending warning or alarm on an electronic device, its warning is asked
UPIC term other people have been presented for the product of proof that declare or actual purchase:Involved product is not probably
Certified products and process terminates.
If in decision block 8, the answer is in the negative, i.e. does not exist permanently connected, then between UPIC and personal code work
Process reaches decision block 14.
Here, database manager inspection whether there is between UPIC and personal code work and is connected temporarily.Affirmative reply
Mean that previous user queried same UPIC, and database manager start determined by first time period, this first
So that user can carry out the second inquiry to UPIC after time period.In the case of affirmative reply, process goes to decision block
15, here, checking whether interim connection belongs to the user being inquired about.In the case of affirmative reply, process is gone to down
One waiting step 21.In the case of being negative answer at decision block 15, the inquiry to UPIC by user in step 16
Interrupt existing interim connection, and first time period determined by replacement in next step 17.Process reaches step 18,
Here, creating new interim connection.If do not exist between UPIC and personal code work be connected temporarily, reach from decision block 14
Identical step 18.
In step 19, determined by first time period start, after this first time period, same UPIC can be carried out
Second inquiry.
In step 20, the genuineness range of information fragment also relating to product is sent to the electronic equipment of user.
In step 21, database manager wait for determined by first time period, after this first time period, make
Obtain user and can carry out the second inquiry to UPIC.
In decision block 22, determined by inspection, whether first time period goes over.
If it is not, process returns in the waiting step 21 of upstream.
If determined by first time period pass by, process goes to step 23, here, database manager starts
Determined by second time period, make user UPIC is carried out the second inquiry (step 24) and simultaneously in step 25 to
Family electronic equipment sends invites.
In step 26, database manager waits user to complete the second inquiry.In controller chassis 27, database manager
Whether second time period determined by determination exhausts, in this second time period, user must carry out the second inquiry so that
Create permanently connected between his/her personal code work and UPIC.
If answer is affirmative, i.e. determined by second time period exhaust without being inquired about, then process arrives
Reach step 28, here, interrupting the interim connection between personal code work and UPIC.Then, process terminates.
In the case of in controller chassis 27, the answer is in the negative, i.e. determined by second time period do not exhaust, then exist
In step 29, database manager checks whether user performs the second inquiry.
In the case of being negative acknowledge in step 19, i.e. also do not carry out the second inquiry, process returns to waiting for step
26.
In the case of affirmative acknowledgement (ACK), create permanently connected between personal code work and UPIC in step 30.Then,
In step 31, one group of security information fragment is sent to electronic user devices, and in following step 32, will integrate
Or other income distributes to user.In following step 33, enable the button for returning bought product, using this
Button, user has the right to cancel and buys and return received integration or income.Then, process terminates.
In the above description, permanently connected between UPIC and personal code work to creating, to draw to product
The process of the proof of purchase that declare or reality gives specific consideration.In this regard, the checkout cabinet of retail shop
Platform provides the confirmation of the actual purchase of product to database manager, rather than after first time period determined by being given at and
Determined by second time period terminate before the purchase declared that the second inquiry is identified is carried out by user to same UPIC
Confirm, and without checkout counter.
In view of by checkout counter institute role, there is provided below step.Trustship in checkout counter and with
The firm UPIC reading is sent to database manager by the software application that its personal code work is associated.Data management system passes through checkout
The personal code work of sales counter identifies that it is superuser.Meanwhile, database manager executes following functions automatically:Reset and determined
First time period and by determined by second time period be set to the time of endless or predetermined time.
Return to the situation of returned work, as mentioned above, it is known that can buy product and then for various reasons and according to
Using electronics reimbursement or product is returned to seller to method by the mode exchanged goods.If meanwhile, user has created in its user
Permanently connected between code and UPIC, once then product is retired, database manager allows for reactivating this UPIC, with
Just avoid being sent to after by previous user's returned work before purchase and afterwards by the answer of misleading and will inquire about together
The user of one UPIC.
Previously have purchased product and the permanently connected user creating between its personal code work and UPIC start new
Inquire about and send returning of product to database manager.
Database manager identifies that personal code work is to create one of permanently connected user with UPIC user
's.
Database manager record needs to reactivate the personal code work of process.
Database manager verifies that this UPIC is the code retaining and is changed into activity.Database manager is demonstrate,proved
Bright user not being permanently attached to this UPIC, this is because he/her return product and losing previously be reserved to he/
Her information, document and income.Obviously, the method according to the invention takes all of preventive measure so that can not by with
(reproduce) this UPIC is replicated to provide the false proof of the purchase declared of product in family.Soft using prior art
Part application is capable of identify that whether the UPIC being applied on product is again produced, replicates, regenerating, shooting.
It should be appreciated that having been realized in the method according to the object of the invention.
The method allows to manufacture not reproducible UPIC.
Additionally, the method allow not limit quantity user inquire about identical product UPIC so as before to buy product and
There is information with regard to this product afterwards.
The method creates the two-way communication of user and manufacturer, this two-way communication not only about product, also with regard in purchase
Any active measures being carried out by manufacturer before and after buying.Each user is set by his telephone number or other electronics
Standby, or identified by other personal identification codes, this can also be for preventing to being arranged on phone or other electronic users set
Standby upper application software wrongful using useful.On the contrary, when by any user carry out to the method according to the invention not just
When use when, for example provide declare buy proof without actually buying product, database manager can intercept him/her
Personal code work, and the identifier of his electronic equipment registered, result is to stop described user from accessing with regard to using
The extra information of the product of UPIC, and deduct the whole integrations previously being accumulated and interests by this user.If user's row
It is proper, he/her can enjoy and equally be provided by manufacturer before buying product and after especially buying product
Discount, gift, integration etc..
It is to be further understood that thanks to the inquiry to UPIC being carried out by user or from consumer, retailer or
Control power the report receiving at mechanism, can notify commercially exist wrongly to marked their product to manufacturer
The fake products of board.
Most of all, preventing fake producer using the trade mark of the manufacturer employing the method according to the invention through awarding
Production and selling fake products on the market of power, because:
1st, manufacturer should notify consumer only to buy the product of the UPIC having the method according to the invention;Exist in user
In the case that on market, discovery does not have the product of UPIC, he/her will not execute and buy and will illustrate abnormal conditions, because existing
The substantially product of personation.
2nd, when each product of manufacturer and when being applied to UPIC, and when being sent to consumer, fake producer
Introduce in authorizing market fake products, undeservedly the unique chance using brand be to buy the real product of n, replicate n
Individual UPIC and being applied on fake products;Economic loss is obvious, and therefore infeasible for fake producer.If made
False person alternatively puts into him on authorizing market and applies unique and identical UPIC always n fake products, user's foot
To provide evidence that declare or actual purchase, this is because database manager intercepts identical UPIC, can be in purchase
The non-genuineness of every other these products of user report of inquiry is carried out before other fake products.
3rd, the mark of fake products is so that distribution chain and the distributor to fake products and manufacturer can be followed the trail of
Swing into action is possibly realized, to give to hit the country of personation and the world controls power the substantial support of mechanism.
Obviously, allow the method according to the invention to be modified and changes, it falls and is being determined in the following claims
In the scope of the present invention of justice.
Claims (13)
1. a kind of method using the unique product identification code (UPIC) being sent by database manager, described unique product
Product identification code is associated with product and is applied to product so that described UPIC can be inquired about by electronic equipment, described
Method includes:
Carry out inquiring about for a UPIC of the information with regard to identical product to database manager from user by software application,
Described software application in such as smart phone, tablet PC or can obtain and sends the other equipment of data etc
Can download on electronic equipment and described user is uniquely associated with by personal code work, wherein said database manager leads to
Cross described personal code work and described user identified by activating pin,
By described database manager, the effectiveness of described UPIC is estimated,
Described database manager with the information relevant with described product or with the information that whether have purchased identical product
And described user is responded,
Create the interim connection and the described UPIC being inquired about by described software application between in described personal code work,
It is characterized in that, by by same user from described first UPIC inquiry determined by first time period end
The 2nd UPIC inquiry carrying out at tail, described user gives the proof of the purchase declared to described product, wherein described
Other users are not had to inquire about same UPIC before 2nd UPIC inquiry.
2. method according to claim 1, wherein, before user is given to the purchase declared described in described product only
Only inquired about by the UPIC that described user has carried out once, this permission:
By the another one query to described same UPIC for another user of the information receiving about described product, and
Restart to obtain described being determined needed for proofs of the purchase declared to described product by another user described
First time period.
3. method according to claim 1, wherein, is inquired about in institute to the second of described same UPIC by described same user
Carry out after stating the invitation of database manager.
4. method according to claim 1, wherein, is created to second inquiry of described same UPIC by described same user
Permanently connected between the described personal code work of described UPIC and described same user.
5. method according to claim 4, wherein, described permanently connected gives described same user to the letter retaining to it
The exclusive access right of breath, document and interests.
6. method according to claim 1, wherein, is being given to described product from user to described database manager
The inquiry to described same UPIC after the proof of the described purchase declared is to the every other use inquiring about described same UPIC
Family provides the response of the non-genuineness of described product, if any.
7. method according to claim 1, wherein, if opened at the described end of first time period determined by described
Determined by beginning, described same user does not carry out described 2nd UPIC inquiry in second time period, then described personal code work with
Described interim disconnecting between the UPIC being inquired about.
8. method according to claim 1, wherein, by product purchase transaction by the purchase declared described in product
Described proof confirms as the true proof of the purchase to identical product, by described product purchase transaction will be described determined by
One time period reset to zero.
9. method according to claim 8, wherein, by product purchase transaction by the purchase declared described in product
Described proof confirms as the true proof of the purchase to described identical product, is determined described by described product purchase transaction
Second time period be extended for endless.
10. method according to claim 8, wherein, by product purchase transaction by the purchase declared described in product
Described proof confirm as the true proof of the purchase to described identical product, by described product purchase transaction by described really
Fixed second time period is extended for the time pre-setting.
11. methods described in any one in 10 according to Claim 8, wherein, described purchase-transaction is sent out in retail shop
Raw, and include:
Described UPIC inquiry is carried out to described database manager from cashier's machine,
First time period determined by will be described resets to zero, and thereafter, described user can repeat described UPIC and inquire about and visit
Ask information, document or the interests retaining to it, and
Second time period determined by will be described extends, and during it, described user must repeat described UPIC and inquire about to access
Information, document or the interests retaining to it.
12. methods according to any one in aforementioned claim, wherein, from described user to described data base administration
The described UPIC inquiry that device is carried out provides one of following response response:
UPIC is not belonging to described data base, in this case, object information is sent to described user;
There is the effective UPIC of interim connection, in this case, the product information from one group of data is sent to described use
Family;
After having carried out the 2nd UPIC inquiry at described user end of first time period determined by described, have permanent
The effective UPIC connecting, in this case, the further product information from one group of data is sent to described user;
Having been presented for the proof to the declaring of product or actual purchase and have accessed to its guarantor in described user
Situation about after information, document and the interests stayed, the described same UPIC with regard to described product further being inquired about
Under, the UPIC that retained;
Non-effective UPIC in the case of not being the UPIC of activation, and send object information;
In the case of by the user different from the user being inquired about to the declaring of described product or actual purchase, intercept
UPIC, and subsequently send the product information of non-certified products, if any.
13. methods according to claim 12, wherein, in the case that product is return retail shop, by having been given by
Described UPIC is changed over by the UPIC of activity to the user of the declaring of described product or the proof of actual purchase, result is to give up
Information, document and the interests retaining to it.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ITRM2014A000110 | 2014-03-10 | ||
ITRM20140110 | 2014-03-10 | ||
PCT/IB2015/051688 WO2015136426A1 (en) | 2014-03-10 | 2015-03-08 | Method of use of a unique product identification code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106415638A true CN106415638A (en) | 2017-02-15 |
Family
ID=50693876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201580013296.3A Pending CN106415638A (en) | 2014-03-10 | 2015-03-08 | Method of use of a unique product identification code |
Country Status (6)
Country | Link |
---|---|
US (1) | US20170076351A1 (en) |
EP (1) | EP3138064A1 (en) |
KR (1) | KR20160131024A (en) |
CN (1) | CN106415638A (en) |
TW (1) | TW201543390A (en) |
WO (1) | WO2015136426A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101670496B1 (en) * | 2014-08-27 | 2016-10-28 | 주식회사 파수닷컴 | Data management method, Computer program for the same, Recording medium storing computer program for the same, and User Client for the same |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1582016A (en) * | 2003-08-09 | 2005-02-16 | 于正月 | Dynamic anticounterfeit identifying method using mobile phone communication |
DE102006016830A1 (en) * | 2006-04-07 | 2007-10-11 | Martin Springer | Branded product e.g. track shoe, protecting method, involves reading bar code in product using mobile telephone e.g. camera phone, and directly verifying authenticity of product with telephone by comparison with branded product data base |
US20070288267A1 (en) * | 2003-09-02 | 2007-12-13 | Augustine Fou | Method of authentication using universally unique identifiers |
WO2009074866A2 (en) * | 2007-12-13 | 2009-06-18 | Daphne Roswita Hosp | Verification system |
CN102289651A (en) * | 2011-08-10 | 2011-12-21 | 深圳市通产丽星股份有限公司 | Label checking method and system |
CN103198411A (en) * | 2013-04-16 | 2013-07-10 | 淄博易通轻工制品有限公司 | Method for verifying genuineness of product repeatedly |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7379899B1 (en) * | 1998-11-13 | 2008-05-27 | Nintendo Of America Inc. | Method and apparatus for verifying product sale transactions and processing product returns |
US20110225064A1 (en) * | 2003-09-02 | 2011-09-15 | Augustine Fou | Methods and systems for using universally unique item identifiers |
MY191823A (en) * | 2007-08-03 | 2022-07-18 | Omarco Network Solutions Ltd | A system and a method of handling a multifunction transaction |
US20120191566A1 (en) * | 2011-01-20 | 2012-07-26 | Eugene Sayan | Product information, vendor referral, and purchase based on scanned indicia |
US9256881B2 (en) * | 2013-11-08 | 2016-02-09 | Vattaca, LLC | Authenticating and managing item ownership and authenticity |
WO2015160505A1 (en) * | 2014-04-14 | 2015-10-22 | Jenda Tag Llc | System and method for product authentication |
-
2015
- 2015-03-08 KR KR1020167025186A patent/KR20160131024A/en unknown
- 2015-03-08 WO PCT/IB2015/051688 patent/WO2015136426A1/en active Application Filing
- 2015-03-08 US US15/125,496 patent/US20170076351A1/en not_active Abandoned
- 2015-03-08 EP EP15715425.3A patent/EP3138064A1/en not_active Ceased
- 2015-03-08 CN CN201580013296.3A patent/CN106415638A/en active Pending
- 2015-03-10 TW TW104107484A patent/TW201543390A/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1582016A (en) * | 2003-08-09 | 2005-02-16 | 于正月 | Dynamic anticounterfeit identifying method using mobile phone communication |
US20070288267A1 (en) * | 2003-09-02 | 2007-12-13 | Augustine Fou | Method of authentication using universally unique identifiers |
DE102006016830A1 (en) * | 2006-04-07 | 2007-10-11 | Martin Springer | Branded product e.g. track shoe, protecting method, involves reading bar code in product using mobile telephone e.g. camera phone, and directly verifying authenticity of product with telephone by comparison with branded product data base |
WO2009074866A2 (en) * | 2007-12-13 | 2009-06-18 | Daphne Roswita Hosp | Verification system |
CN102289651A (en) * | 2011-08-10 | 2011-12-21 | 深圳市通产丽星股份有限公司 | Label checking method and system |
CN103198411A (en) * | 2013-04-16 | 2013-07-10 | 淄博易通轻工制品有限公司 | Method for verifying genuineness of product repeatedly |
Also Published As
Publication number | Publication date |
---|---|
US20170076351A1 (en) | 2017-03-16 |
KR20160131024A (en) | 2016-11-15 |
WO2015136426A1 (en) | 2015-09-17 |
TW201543390A (en) | 2015-11-16 |
EP3138064A1 (en) | 2017-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10412071B2 (en) | Secure transaction systems and methods | |
KR101496939B1 (en) | Mobile coupons utilizing peer to peer ranging | |
CA2888800C (en) | Payment processing access device and method | |
US8595062B2 (en) | Systems and/or methods for fraud detection in award point programs | |
CN1998019A (en) | System and method for securely authorizing and distributing stored-value card data | |
US10796320B2 (en) | Systems and methods for passively determining a ratio of purchasers and prospective purchasers in a merchant location | |
CN105894313A (en) | Methods And Apparatus To Associate Transactions With Media Impressions | |
CN107657367B (en) | Retail performance statistical method based on two-dimension code | |
CN103886468A (en) | Anti-counterfeiting method and system based on mobile intelligent terminal | |
CN112508561A (en) | Coupon data sharing method and device, block chain sharing platform and storage medium | |
CN109872223B (en) | Virtual article transaction method, device, equipment and storage medium | |
KR20190009921A (en) | Terminal and platform for authenticating genuine products and the authenticating method by using the same | |
CN109547554A (en) | No card interactive system and simulation card apparatus | |
CN105283892A (en) | Method for providing e-commerce secure transactions | |
CN106415638A (en) | Method of use of a unique product identification code | |
CN106600254B (en) | Multi-account management method and device for user | |
US20160155133A1 (en) | Authentication method for consumer products via social networks | |
US20230196401A1 (en) | Methods, systems, and devices for managing information between merchants, intermediaries and/or end users | |
US8868719B1 (en) | Identity and reputation monitoring | |
CN106296327A (en) | The self-service method of inspection of virtual objects and self-service transfer method | |
CN109523278A (en) | A kind of shopping online verifying system based on goods marks | |
KR20000036568A (en) | System and method for selling merchandise by using network | |
CN113689232B (en) | Method and device for detecting crowd recall service and electronic equipment | |
CN101571943A (en) | Relay type authentication anti-counterfeiting method | |
Lanza | Aggregated And Anonymized Tracking Of Offline Purchases in Response to Sponsored Content in a Voice Activated Computing System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170215 |
|
WD01 | Invention patent application deemed withdrawn after publication |